Advanced search

Advanced search is divided into two main parts, and one or more groups in each of the main parts. The main parts are the "Search for" (including) and the "Remove from search" (excluding) part. (The excluding part might not be visible until you hit "NOT" for the first time.) You can add new groups to both the including and the excluding part by using the buttons "OR" or "NOT" respectively, and you can add more search options to all groups through the drop down menu on the last row (in each group).

For a result to be included in the search result, is it required to fit all added including parameters (in at least one group) and not fit all parameters in one of the excluding groups. This system with the two main parts and their groups makes it possible to combine two (or more) distinct searches into one search result, while being flexible in removing results from the final list.

Limit the search further

Here you can limit your search further, your result list will only contain those who match all of the criteria that you fill out in this part (combined with the advanced search from above)

The Swedish Air Force (SwAF) has a long experience of using simulators for pilot training and they are in use within many of the aircraft-systems the SwAF currently operates. However, statistics show that the simulators are not used to their full extent. In combination with the lack of clear and adequate objectives in some cases, questions concerning the effectiveness of the use of simulators arise.

The aim of this essay was to investigate if pilots working at a operational squadron in the Swedish Air Force believe that their training in simulators contributes to their knowledge and progress and also what the planning for and realization of the training itself looks like.

The research was conducted as qualitative interviews of operational pilots during a period of training at Swedish Air Force Combat Simulation Centre (FLSC). The answers from the interviews was analyzed using operational indicators deduced from general training theories as well as from more specific results from studies of simulator characteristics.

The result shows that the pilots believe that simulators are a valuable supplement to their flight training and if the use of simulators in the Swedish Air Force is ineffective, it most likely is not due to the attitude of the operational pilots concerning simulator training or them having an inadequate knowledge of how simulators should be used.

What is the added value of strategic theory in the understanding of Swedish securityand defence policies? By introducing a series of concepts that identify policiesthat are pursued in both peace and war such as escalation, deterrence, andweapons acquisition, we argue that strategic concepts contribute to the analysisof Swedish security policy mainly by highlighting forms of policy that do not conceptuallyrest upon the dichotomy of war and peace. Differently from mainstreamscholarly analysis that treats deterrence as one, uniform concept, we differentiatebetween four different logics of deterrence. Using this conceptual tool, we analyseSwedish policies in the 1950s and 2010s and discover that although Sweden pursueddeterrence during both this periods, her policies depend on a different logic. Bycomparison, 1950s Sweden understood to pursue deterrence understood as a wall,while 2010s Sweden understands the term in terms of a shield.

The principle of surprise is one of the oldest principles that is to used in battle. Principle as the basis of the conflict and the methods you can use to succeed in battle. But what does surprise really mean, and how is it used?

The essay will problematize the principle of surprise and connect the research on surprise to Pearl Harbor and the Six Day War that has been seen to be typical surprise attacks. Did the attacks look the same and do the indicators from the literature show that it was a surprise?Initially the principle surprise will describe the selected literature to illustrate the meaning. The literature will be analyzed and make a basis for the later part of the essay.

Then I will analyze the literature and apply it on the two surprise attacks, if they were using the same indicators.

Finally it discusses the results and the author suggests new research related to the topic.

The purpose of this paper is to problematize the principle of surprise and the indicators that affect the principle of surprise. The essay will conduct a comparative method between Pearl Harbor and the Six Day War.

This analysis is performed by a qualitative text analysis and essay analytical framework is the principle of surprise. The theoretical basis of this paper is the analysis based on the theory and literature surprise of Pearl Harbor and the Six-Day War.

A major Norwegian defence procurement project takes decades from project initiation to the desired military capability is delivered and has reached full operational capability. The Norwegian Armed Forces’ primary mission is to maintain a credible deterrence and prevent armed conflicts arising, meaning that the capability acquired through military procurement projects must play into future general deterrence. Do Norway’s strategic military capability procurement projects contribute to a credible and capable deterrence?

The purpose of this study is to gain a deeper understanding of the deterrence potential of two chosen Norwegian military procurement projects of strategic importance. The capabilities studied are the acquisition of the US fifth generation fighter, F-35 Lightning II and the 212CD submarine to be designed and built by Germany. The two projects have a combined estimated investment cost of 113 billion NOK.

Deterrence is a large area in social science and the discipline of War Studies. This study applies a deterrence theory lens, primarily based on the conclusion in Zagare’s and Kilgour’s perfect deterrence theory regarding the importance of capable and credible threats, operationalised through Dalsjö’s five dimensions of threshold defence.

The analysis identifies a clear credibility issue with one of the projects and the paradox that cost saving decisions intended to ensure operational availability and increase credibility also make the capability more vulnerable and less credible due to lack of redundancy.

This book reflects on the way in which war and police/policing intersect in contemporary Western-led interventions in the global South. The volume combines empirically oriented work with ground-breaking theoretical insights and aims to collect, for the first time, thoughts on how war and policing converge, amalgamate, diffuse and dissolve in the context both of actual international intervention and in understandings thereof.

The book uses the caption WAR:POLICE to highlight the distinctiveness of this volume in presenting a variety of approaches that share a concern for the assemblage of war-police as a whole. The volume thus serves to bring together critical perspectives on liberal interventionism where the logics of war and police/policing blur and bleed into a complex assemblage of WAR:POLICE. Contributions to this volume offer an understanding of police as a technique of ordering and collectively take issue with accounts of the character of contemporary war that argue that war is simply reduced to policing. In contrast, the contributions show how – both historically and conceptually – the two are ‘always already’ connected. Contributions to this volume come from a variety of disciplines including international relations, war studies, geography, anthropology, and law but share a critical/poststructuralist approach to the study of international intervention, war and policing.

This volume will be useful to students and scholars who have an interest in social theories on intervention, war, security, and the making of international order.

The 2015 Russian National Security Strategy aims to achieve autarky from Western influences on global security, the rule of law, and global trade. By applying a holistic mix of military, political, and economic means to weaken the West, Russia is working hard to strengthen its own role as a global player. Militarily, Russia makes good use of Hybrid War against its Western neighbors, as seen in its intervention in Syria and in its efforts to undermine NATO and the EU.

This article discusses a new form of war, ‘Hybrid War’, under inclusion of aspects of ‘cyber-terrorism’ and ‘cyber – war’ before the backdrop of Russia’s ‘Ukrainian Spring’ and the continuing threat posed by radical Islamist groups in Africa and the Middle East. It discusses the findings of an on-going Hybrid Threat project by the Swedish National Defence College. This interdisciplinary article predicts that military doctrines, traditional approaches to war and peace and its perceptions will have to change in the future.

Multimodal, low intensity, kinetic as well as non-kinetic threats to international peace and security including cyber war, low intensity asymmetric conflict scenarios, global terrorism, piracy, transnational organized crime, demographic challenges, resources security, retrenchment from globalization and the proliferation of weapons of mass destruction were identified by NATO as so called "Hybrid Threats" (cf BI-SC Input for a New NATO Capstone Concept for The Military Contribution to Countering Hybrid Enclosure 1 to 1500/CPPCAM/FCR/10-270038 and 5000 FXX/0100/TT-0651/SER: NU0040, dated 25 August 2010). This submission aims to introduce the audience to this form of security threat with a particular focus on "cyber" terrorism and war. This new form of conflict in the fifth dimension has a truly hybrid risk potential and warrants a new holistic counter approach: from law enforcement, counter cyber strategies to kinetic responses. The authors will present the findings of an ongoing Hybrid Threat experiment, which is being undertaken at the Swedish Defence College, with a focus on the role of cyber attacks within the wider context of asymmetric conflict and how the existing legal framework governing the use of force and the law applicable to hostilities does not necessarily reflect on this new form of threat.

This case-study examines the Swedish armed forces in Afghanistan between 2009 and 2012. The aim of this study is to explore how it comes that an organization that is promoting security and stabilizing operations in a post conflict setting in northern Afghanistan gaudily turns in to an aggressive fighting force. The analytic framework is based on Theo Farrells theory of military adaption as well as Lauren Wilcox’s theory of the role of gender as an explanation of military organisations offensive bias. The results show that the Swedish behaviour should be understood as a combination of adaption to demands form allied forces, a result of pollical will to achieve national political goals and a strong offensive bias.

Background: There is a large worldwide market for assault rifles. Many armed forces need new weapons when their old cold war equipment starts to break down. Throughout the world today, the development of new variants of assault rifles continues and the defence industries are doing business across the globe. Customers demand low prices and high quality.

Objective: To investigate assault rifles that are currently being used around the world, how they evolved and which factors are important in the development of a future assault rifle, and to compare two widely used assault rifles to explore the differences and determine which one is better.

Methods: A qualitative study of literature combined with a multi-target analysis of two assault rifles from a given scenario in an urban area.

Results: Small arms have been the soldier's main weaponry for hundreds of years, and will continue to be so for many years to come. Development of the future assault rifle will be based on such factors as shooting distance, size of magazine and weight. The AK5C rifle was ranked number one ahead of the G36E rifle in the comparison as it was smaller and therefore easier to use in confined spaces.

Conclusion: Many current rifles are similar in performance and size. Development of the future rifle will not only depend on the rifle itself, but also on the accessories, including ammunition, and the possibilities for customization.

The thesis discusses Rapid Dominance and Shock and Awe. A theory developed by the authors Ullman and Wade, published in a paper 1996. The paper called Shock and Awe Achieving Rapid Dominance was intended to develop a new way for the U.S. military to plan and execute operations. After the Cold War were inevitable changes of the U.S. military's resources taking place. United States Armed Forces would be reduced. The authors of the theory wanted to develop a concept that made the Armed Forces able to manage this change. To manage this change, the authors wanted to develop a concept that could work as a doctrine in the future. The concept would require fewer resources but provide the same or even more power than they previously admitted concepts.

The theory is illustrated by a study on how the theory applied in the planning of the Iraq war in 2003. Iraq war which would be characterized by a plan intended to utilize modern technology for activity against selected Iraqi military targets in the military command and information dissemination to create confusion in the Iraqi troops to the will to fight would end by the shock and awe they experienced.

The study concludes with a discussion about the planning of operations and the generalization of Ullman and Wade's theory. The author concludes that the thoughts of the theory can be found in depictions of the planning of the operation. However, it is difficult even in the planning stages is difficult to plan to achieve Rapid Dominance by Shock and Awe although there is access to modern military equipment and methods.

The old established description gunboat diplomacy has in modern time changed to a broader and more nuanced definition called maritime diplomacy. But what is maritime diplomacy and how is it described? This essay analyses the theories from the Englishman James Cable and the American Edward Luttwak. Both Cable and Luttwak represent nations which have a global security interests and deploy their maritime forces worldwide. The foundation for their theories is power politics. Is it possible to apply their theories in a small-state perspective?

Analyze of Cable and Luttwaks theories crystallizes three categories that can be defined in maritime diplomacy: naval presence, naval coercion and naval deterrence. By applying these three categories on a case study I want to scrutinize if the categories is applicable on a small state. The Swedish naval expedition to Aland in 1918 works as case study. The aim is to see if today’s theory of maritime diplomacy is applicable on how a small-state uses their maritime forces.

The conclusion is that naval presence is suitable for a small-state to use. Naval presence gives room for political maneuvers and god possibilities to have an influence on the situation. Naval presence also gives reasonable security to own forces due to the possibility to withdrawal if the situation deteriorates.

Naval coercion is also useful for a small-state, but the situation should be thoroughly analyzed in order to have control over the course of events. The political will together with proper guidance is important for succeeding in naval coercion.

Naval deterrence can be used but depends on the relation between forces. A small-state can only deter an opponent that has less ability of power projection.

International cybersecurity is arguably one of the most serious, complex and recent security-issues of our time. The connectivity between EU member states regarding cybersecurity due to the borderless nature of cyber, together with increasing threat-levels, has made the need for a common response widely acknowledged in the EU for several years. Even so, a common EU cybersecurity response involves problems such as reluctance of member states to share information, that cybersecurity management is linked to national security and therefore touches upon sovereignty, and different levels of cybersecurity development between member states. Despite this, the Network and Information Security Directive was adopted by the European Council in May 2016, involving EU-wide binding rules on cybersecurity. This thesis examines and explains, through a neo-functionalistic approach, how and why this development towards supranational management of cybersecurity in the EU has happened. The author finds that cybersecurity management seems to have institutionalized from a nascent phase during 2013, moving towards an ascendant phase during the end of 2013 and 2014, to end up between an ascendant and a mature phase during 2015 and 2016 – which makes the adoption of the NIS-directive logical. The neo-functionalistic explanation to the development of supranational cybersecurity management in the EU highlights the role of the Commission as a ‘policy entrepreneur’ and the publication of the EU cybersecurity strategy, accompanied by the proposal for the NISdirective in 2013. These regulatory outputs sparked further institutionalization by providing many opportunities and venues for member states to interact and build networks on cybersecurity issues, by initiatives with normative impact to foster an EU ‘cybersecurity community’, by the continuous strengthening of supranational cybersecurity actors such as ENISA, and by supranational cybersecurity cooperation platforms, such as the NIS-platform and the European Private Public Partnership on cybersecurity. Between 2013 and 2016, 21 EU Member States published national cybersecurity strategies, almost all referring clearly to their commitment to EU cybersecurity initiatives. This provides an indicator of a high level of legitimacy of supranational cybersecurity management. However, the thesis also finds that the strongest supporters of EU cybersecurity management are not the most powerful member states but rather the smaller ones. While not expressing a strong commitment to EU initiatives in cyber policy documents, the most powerful member states still agreed to the NIS-directive. This supports the neo-functionalist notion about the “stickiness” of an institutionalization-process, and the possibility that powerful states might have double paths, committing to EU regulation and institutionalization while still continuing their own way.

The following study aims to understand implementation of UN Security Council Resolution 1325 (SCR1325) in the Swedish international forces, with focus on the Swedish intelligence force in the UN peacekeeping mission in Mali, Africa. The intention is to understand how the Swedish national strategy regarding implementing SCR1325, is actually being successfully implemented on the tactical level of the Swedish military contribution in Mali. This is investigated with the help from 6 Swedish Mali veterans, who have served in the Swedish intelligence force in Mali. These veterans have answered a survey regarding their training and work, of how they involved women in the process of peace and security. Neither of the veterans had an officer training at the time leading to their deployment in Mali, which allowed this study to identify if the Swedish national strategy regarding SCR1325 was actually successfully implemented in the lower ranks of the military organization. Many scholars have observed the problem with implementing political decisions in military organizations, especially those with a feminist approach such as SCR1325. The material produced by the surveys is analyzed through an analytical framework consisting of these three variables: can, will and understand. These variables have previously been successfully used in studies regarding implementation in military organizations. The conclusion of this study is that the Swedish military organization doesn’t implement SCR1325 to its fullest. The Swedish military organization does not successfully reach their own, or the national, agenda regarding implementing SCR1325 on the tactical level. This problem is most likely because the variable of understanding is inadequate since the veterans had nearly any education regarding how to involve women in their work with peace and security.

On April 29, 2003, a catastrophic flood occurred in the Argentina city of Santa Fe de la Vera Cruz. Soon, the disaster became a political issue, as they had made serious accusations against the authorities and decision makers regarding negligence, corruption and lack of disaster preparedness. A local protest movement emerged, claiming both the allocation of responsibilities and financial compensation for the losses suffered by the victims. This article analyses the role of material memory and oblivion on the post disaster scene, more specifically, how different social actors in Santa Fe used places and objects in the contentious making of a disaster memoryscape. The analysis is based on ethnography from transtemporal translocal and field research conducted in Santa Fe between 2004 and 2011, and applies anthropological and sociological theories of memory to analyse these processes.

This special issue focuses on the phenomena of disasters and crises, and how such extraordinary and disruptive events can be understood from the perspective of social anthropology. Critical events are not unique to Latin America, yet the impact of hydro-meteorological and geological disasters have dramatically increased in the region in the last century (IDB 2010, UNISDR and Corporation OSSO 2013) and many countries have historical and recent experience of profound social, political and economic crises. They are complex challenges for societies to manage, mitigate and reduce, which is why social science has a major contribution to make in understanding both the causes and the effects, and forward sustainable solutions. This special issue presents four articles based on empirical cases from Latin America, with an emphasis on Argentina and Brazil, which demonstrate the anthropological contribution to the understanding of critical events. The authors make no claim to provide a complete view of the anthropology of disasters and crises in Latin America, but rather to account for a growing research field in the region, which is already making important contributions to multidisciplinary studies of critical events, and to the policy development of disaster risk reduction and crisis management.

Flooding has long been a recurrent problem in the Argentinian city of Santa Fe, mainly affecting the poverty-stricken suburban outskirts. In 2003 one of the worst floods ever occurred, which also affected residents in the middle income sectors who had never been flooded before and who reacted with an extraordinary process of commemoration and protest against the government for its lax disaster management. Paradoxically, most other past disastrous floods in the city’s history seem to dwell in the shadows of social oblivion. Drawing on ethnographic fieldwork in the years 2004–2011, this article analyzes how local flood memories are made through daily life practices and places in the suburban outskirts, more than through public commemorations, which has implications for vulnerability and risk.

This book addresses the challenges presented to the EU by an increasingly complex security environment. Through the interdisciplinary approach taken, researchers in economics, law and political science identify a range of problems relating to the multiple security threats that the EU faces, and present new means to address them within their respective fields of expertise. The contributions provide accessible and policy-relevant analyses of crucial challenges to the EU’s ability to function as a political union in the years ahead.

This work analyzed the German blitzkrieg in World War II to produce fourcomparison dimensions that can be said is the essence of blitzkrieg. Thesecomparative dimensions are then used in case studies to highlight the process ofblitzkrieg. I make two case studies in my work in Israel and the U.S. war in the SixDay War of 1967 and the Iraq war 2003.In World War II the Germans achieved great success in the beginning of the warbecause they used the blitzkrieg. After World War II, one can wonder whetherblitzkrieg is still feasible and the necessary conditions for this. The purpose of mystudy is to examine the key components of blitzkrieg after World War II.The method I am using in my work is qualitative text analysis, based on previousresearch on lightning war. In the analysis section, I make a comparative analysis ofmy two case studies.

The Swedish Armed Forces aim to reflect Swedish society, including its ethnical composition. Despite these ambitions and the fact that non-native Swedes are overrepresented among unemployed Swedes, recruitment is over all slow. Perhaps the Swedish Armed Forces know too little about what motivates this potential group of recruits? And perhaps the recruitment process is discriminating against non-native Swedes? This essay aims to answer what attracts foreign born citizens to join the military and what makes them stay in the service. The research methodology includes interviews and surveys of immigrants. The results of these interviews and surveys are subsequently analysed and viewed through the perspective of military sociologist Fabrizio Battistellis’ theory about soldiers' incentives. According to Battistelli, three types of incentives exist: the paleomodern, the modern and the postmodern. His own study, Peacekeeping and the Postmodern Soldier, determined Italian solders primarily enlisted for postmodern incentives. Swedish scholars has found that the same pattern applies to Swedish military personnel. But how about the non-native Swedes? This study shows that predominantly modern incentives attract non-native Swedes to join the military, and mainly paleomodern incentives make them stay within it. However, while Swedish soldiers seem to be driven by postmodern incentives, immigrants are not influenced by these in any noticeable way. Instead the study’s results indicate that there are further categories of motives affecting the non-native Swedes, namely contextualand cultural incentives.

The Swedish Armed Forces aims to have women represent at least twenty percent of its employed military personnel. A significant amount of effort is put into attracting and recruiting women and once employed; a large amount of money is spent on training and education. Despite these investments, the percentage of women within the Swedish Armed Forces has never reached beyond fifteen percent. Perhaps not enough is done to keep the women within the forces? This essay aims to answer what makes women stay in the service and what actions the Swedish Armed Forces could take to preserve its female resources.

The research consists of a four step method combining both qualitative and quantitative measurements. The initial step is a meta-analysis of pre-existing surveys performed by the Swedish Armed Forces analysing notable differences between men’s and women’s incentives to stay or leave the service. In the second step, a number of women informants are interviewed to research and support a preliminary theory originating from step one. The third step correlates the first two steps to determine specific women’s incentives to staying or leaving. In the fourth and final step, a conclusion is made and a recommendation is brought forth on what could be done in order to keep women employees within the Swedish Armed Forces.

The results show that three factors above others tend to influence women's incentives to stay or leave the service: firstly the relationship to the closest commander, secondly; an equal opportunity work environment, and thirdly; long term personal development and career planning.

How can we understand intelligence assessments and intelligence work? The intelligence literature offers several plausible causes of failures and the consequences of such failures. However, there is a direct lack of theories or frameworks that connect these variables, that is, there is an incomplete understanding of both how those variables interact and their underlying mechanisms. Failures as such do only give one part of the picture. Why intelligence succeed is equally if not more important to understand. The military intelligence service from an institutional perspective may help to give this understanding.

This study connects these variables with Ostrom’s Institutional Analysis and Development (IAD) framework, which yields a model to understand the mechanisms of institutional on the assessment and lays a foundation for a common terminology. The study uses the Swedish military intelligence institution active in Afghanistan between 2008 and 2012 as a case.

Intelligence is vital for the outcome of battles. As long as humans wage war, there will be a need for decision support to military and civilian leaders regarding adversaries or potential adversaries. However, the production of intelligence is neither easy nor without pitfalls. There is a need to better understand the predicaments of intelligence analysis.

Intelligence is bureaucratically produced as well as socially constructed and created in a distinct cultural context. The ‘institution’ captures these three aspects of influence. Therefore, with a particular focus on military intelligence, this thesis aims to deepen the understanding regarding institutional influence on intelligence assessments. The literature regarding intelligence has grown steadily over the last three decades. However, theories and frameworks aimed to understand the phenomenon are still sparse. This is even more true for literature regarding contemporary military intelligence. This thesis intends to contribute to bridging these research gaps. This is done by studying the Swedish military intelligence institution from several different perspectives: its rules-in-use, shared beliefs, and the incoming stimuli primarily related to conducting threat assessments.

More precisely the thesis investigates the use of quantitative methods, doctrines (i.e. the formal rules), and shared beliefs connected to epistemological assumptions and threat assessments. The main contribution of this thesis is that it establishes and describes a casual link between a military intelligence institution and an assessment, by drawing upon rulesin-use and belief systems and their effect on the mental model and consequently the perception of the situation connected to a cognitive bias, and thereby its effect on a given assessment. The thesis makes an effort to render intelligence studies more generalizable, by way of adopting the Institutional Analysis and Development (IAD) framework. The metatheoretical language of the IAD is a promising avenue for explaining and describing the institutional influence on intelligence assessments.

Incidents are the key data for several of the statistical reports and analyses created within the military intelligence community. This paper discusses factors that affect the utility of quantitative methods in military intelligence analysis when used in a low intensity conflict. The first half of the paper presents the general critique of the use of quantitative methods. The second half applies this critique to the case of incident reporting in Afghanistan.